TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Speculative Dereferencing of Registers: Reviving Foreshadow [pdf]

168 pointsby beefhashalmost 5 years ago

11 comments

spockzalmost 5 years ago
Linux has flags that allow disabling mitigations to get performance back. MacOS and Windows probably have the same. Pretty much the only thing that is running unauthenticated workloads on my dev machine are my browser and mail client. Is there a way to disable the mitigation’s globally but enable them per process? I don’t mind much getting a 10-30% performance hit on browsing, but I do mind when compiling/testing things.
评论 #24090300 未加载
评论 #24110573 未加载
评论 #24090483 未加载
评论 #24090621 未加载
diskmuncheralmost 5 years ago
A thought just came to my mind. Let's say 30 years ago, I said to a colleague with whom I shared accesses to some Unix systems, "You know, I can use 'ps' to see what processes you are running. If I know the details about certain flaws of those binaries, I may be able to run a custom binary simultaneously on the system and figure out some of your data!" Would he/she be surprised or alarmed?
评论 #24090183 未加载
评论 #24090583 未加载
评论 #24089887 未加载
评论 #24089806 未加载
aspenmayeralmost 5 years ago
Can we change the link to the actual paper?<p>Speculative Dereferencing of Registers:Reviving Foreshadow<p>Martin Schwarzl, Thomas Schuster, Michael Schwarz, Daniel Gruss<p><a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2008.02307" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2008.02307</a>
kristopolousalmost 5 years ago
Is there a better article than this? Maybe I&#x27;m just tired but this doesn&#x27;t seem to be very coherently structured.
verroqalmost 5 years ago
Direct link to research: <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2008.02307.pdf" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;pdf&#x2F;2008.02307.pdf</a>
andy_pppalmost 5 years ago
Has anyone used these techniques in the wild to steal certificates from another customer on AWS or use Javascript to start probing memory on my machine from the browser? Are these attacks really severe or is it all theoretical?
cel1nealmost 5 years ago
Side-channel attacks are an inherent property of computing hardware. You can never fully &quot;disguise&quot; a computation as a different one or as no computation.<p>You can just lower the signal to noise ratio by various means, so you gain some time until better statistical methods or clever tricks filter out the signal again.
评论 #24089856 未加载
dependenttypesalmost 5 years ago
DJB wrote a paper about how &quot;Speculative execution is much less important for performance than commonly believed.&quot; <a href="https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2007.15919" rel="nofollow">https:&#x2F;&#x2F;arxiv.org&#x2F;abs&#x2F;2007.15919</a>
评论 #24091065 未加载
评论 #24142633 未加载
评论 #24090826 未加载
scscscalmost 5 years ago
Some might enjoy a teaser video of related work by some of the same authors: <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=baKHSXeIIaI" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=baKHSXeIIaI</a>. For context, the teaser was produced due to the conference going virtual because of the pandemic.
wahernalmost 5 years ago
The article&#x27;s presentation of the research is completely wrong. There aren&#x27;t any new side channels here. All the paper purports to show (albeit in a somewhat self-aggrandizing manner) is that the mechanisms for Meltdown and Foreshadow were incompletely understood when <i>originally</i> <i>presented</i>. But there&#x27;s nothing knew in the notion that speculative execution optimizations are responsible for most side channels, nor that they played a role in Meltdown and Foreshadow. &quot;Spectre&quot; is a play on words--it alludes to speculative execution.<p>There aren&#x27;t any major new exploits detailed in this paper. They introduce a slightly new gadget for exposing data, but it can be and is mitigated by existing techniques (e.g. retpolines). The only noteworthy aspect is that, as it regards SGX, the mitigations haven&#x27;t yet been generally applied. But new ways to break SGX are a dime a dozen these days.<p>Interesting and rigorous work, but there don&#x27;t seem to be any real implications here. It&#x27;s more like a more concise restatement of researchers&#x27; present understanding, using the benefit of hindsight and some additional footwork to fill in some small gaps.
评论 #24091443 未加载
评论 #24089865 未加载
Brosperalmost 5 years ago
This website sucks, it attacked me with two newsletters popups. Definitely shouldn&#x27;t be on Hacker News.